Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

More sophisticated version of the malicious firmware could try to patch the new ota firmware image on the fly. Once compromised - always compromised.


It's hard to reliably binary patch something unknown ahead of time.

All Trezor would need to do is change the compilation options on a fairly regular basis, and any patching will fail.

Combine with the fact there is a reward to send in devices means they can analyze any evil devices and make sure their instructions to users will reliably detect all evil devices they're aware of.

Still doesn't stop supply chain attacks, but makes them far harder.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: